Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers.
Jiyi ZhangHan FangWesley Joon-Wie TannKe XuChengfang FangEe-Chien ChangPublished in: AsiaCCS (2023)
Keyphrases
- countermeasures
- electronic commerce
- multi agent
- risk management
- digital image watermarking
- terrorist attacks
- electronic marketplaces
- ddos attacks
- data corruption
- traffic analysis
- data sets
- electronic markets
- online auctions
- cyber attacks
- transaction costs
- java card
- security mechanisms
- denial of service attacks
- watermarking scheme
- attack detection
- information systems